Wissen - Denken - Meinen - Siemens: Vertragstreu, aber unverantwortlich? | radioeins

Possibly related…

  1. Berlin - Vorentscheidung für Siemensstadt | radioeins

    Vor gut einem Jahr hatte Siemens angekündigt, bis zu 600 Millionen Euro in Spandau zu investieren. Die “Siemensstadt 2.0” ist 70 Hektar groß - zum Vergleich: das Tempelhofer Feld ist fünfmal so groß - und auf diesen 70 Hektar soll ein Campus für Wohnen, Forschung und Arbeit entstehen.

    https://www.radioeins.de/programm/sendungen/modo1619/_/siemensstadt.html

    —Huffduffed by markus2280

  2. Kommentar von Lorenz Maroldt - Wagenmangel der Berliner U-Bahn | radioeins

    Derzeit sind so viele U-Bahn-Züge defekt und in Reparatur, dass ein normaler Betrieb gefährdet ist. Siemens kann keine neuen Fahrzeuge liefern. Die BVG wollte deshalb neue Züge ohne Ausschreibung bei der Firma Stadler in Pankow bestellen. Dagegen zog Siemens allerdings vor das Berliner Kammergericht - mit Erfolg. Denn die Direktvergabe des millionenschweren Auftrags durch die BVG stößt beim Kammergericht auf rechtliche Bedenken. Das Hin und Her löst den Mangel an U-Bahn-Zügen wohl kaum – die U4 könnte deshalb wohlmöglich komplett eingestellt werden.

    Verspätung, Ersatzverkehrt, Ausfall - Kummer ist man in Berlin als BVG-Nutzer ja gewohnt, aber wird der Ausnahmezustand wohlmöglich bald zum Normalzustand? Ein Kommentar von Lorenz Maroldt, Chefredakteur des Tagesspiegels…

    https://www.radioeins.de/programm/sendungen/der_schoene_morgen/kommentar/lorenz_maroldt.html

    —Huffduffed by markus2280

  3. George Siemens ~ Stephen’s Web

    As George Siemens writes, we are offering Connectivism and Connective Knowledge for the third time starting Monday. As he notes, " We are doing away with the central-space of Moodle – our final break from the LMS and will be using only the commenting feature within gRSShopper. While it might not seem like a huge change on the surface, it is probably our most significant experiment to date… In CCK11, we are still providing a centering-like structure (gRSShopper), but the format will push more of the conversation to blogs and other environments. Rather than being the course centre, gRSShopper will be more of a conduit – pushing discussion into spaces owned and controlled by learners."

    Stephen’s Web, the home page of Stephen Downes, with news and information on e-learning, new media, instructional technology, educational design, and related subjects

    —Huffduffed by eflclassroom

  4. WMR81 – Alle Wege führen zu Facebook

    Wir haben uns hier zusammengefunden, um uns über die Unzureichendheit der Welt (Internet!!) zu beklagen. Doch all das Nörgeln und Zetern, all Warten und Hoffen, es hat keinen Zweck. Am Ende landen wir doch eh alle bei Facebook. Die einen mehr, die anderen weniger. Und aus den unterschiedlichsten Gründen. Doch hört selbst.

    —Huffduffed by danielbuechele

  5. Episode 47: Soziale Kompetenz für Architekten | heise Developer

    Michael Stal hat in dieser Episode Matthias Singer zu Gast. Dieser verantwortet in den Siemens-Curricula für Softwarearchitekten seit circa 10 Jahren das Thema "Soziale Kompetenz". Es geht daher nicht um technische Aspekte. Gerade weil Architekten viel Zeit mit Kommunikation verbringen und in der Regel keine Führungsposition inne haben, spielen soziale Fähigkeiten eine bedeutende Rolle – sie können teilweise noch wichtiger sein als fachliche Aspekte. Doch was genau ist soziale Kompetenz, was kann sie und was kann sie nicht leisten, und wie lässt sie sich antrainieren? Das sind Fragen, die wir in der Episode behandeln.

    http://www.heise.de/developer/artikel/Episode-47-Soziale-Kompetenz-fuer-Architekten-2413482.html

    download

    Tagged with soft skills

    —Huffduffed by aznar

  6. SCADA StrangeLove 2

    SCADA StrangeLove team will present their research on ICS systems for the second time on CCC. Last year we showed current situation with security of industrial world and disclosed a big number of vulnerabilities found in Siemens ICS solutions. Part of vulnerabilities, we can say most notable one, wasn’t disclosed due to Responsible Disclosure. This time we already know. We will speak about several industrial protocols and their weaknesses. During this year we played with new industrial hardware and software – this patitially brings new “We don’t know yet” vulnerability details. Moreover, we’ll mention creepiest bugs undisclosed from last year, tell you about new ones and build attack vectors from them. At last, we will share our experience in pentesting ICS enviroments.

    Speakers: Gleb Gritsai and Sergey Gordeychik

    1. Introduction

    1.a. About SCADA StrangLove

    1.b. We were here before

    c. Why we eat what we eat

    1. ICS in internet – piece of cake

    2.a. Massscan, zmap, sonar, etc.

    2.b. One time scan isn’t sexy today – Continuous monitoring

    2.c. Pizza Owens on the internets now

    1. More protocols – more fun

    3.a. Profinet/DCP

    3.b. IEC104 – the bad and the bad

    3.c. MMS – from reflash to tag

    3.d. S7 saga continued

    3.e. Every self-respecting ICS vendor must have own buggy protocol

    1. “Darwin” bugs in ICS

    4.a. Statistic and detailed analysis of vulnerabilities discovered by SCADASL team

    1. Don’t try it at home - Pentesting ICS environment

    5.a. Listen to the turbines

    5.b. Sit in hardened rooms

    5.c. Remember the exit paths

    1. What we already know. Fixes and releases in 2013

    2. Things we don’t know yet

    7.a. Old friends: Siemens

    7.a.i. New S7-1500 PLC

    7.a.ii. Cookie monster to own all PLC’s

    7.b. New friends

    7.b.i. Invensys vulnerabilities

    7.b.ii. ABB vulnerabilities and exploit demo

    7.b.iii. Emerson vulnerabilities

    1. Special 30C3 releases

    http://events.ccc.de/congress/2013/Fahrplan/events/5582.html

    Day: 2013-12-28 Start time: 23:00 Duration: 01:00 Room: Saal 2 Track: Security & Safety Language: en

    —Huffduffed by Jonny007MKD

  7. Play in new window

    Podcast: Play in new window

    | Download (Duration: 1:05:55 — 60.3MB)

    | Embed

    We had Kim Zetter on stage for an interview at ICSage during S4x15 Week to discuss her new book: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. This first 2015 episode of the Unsolicited Response Podcast features that interview.

    The podcast includes:

    Who was the target audience for the book

    Why Siemens didn’t play a bigger role in the book

    The hard to believe Sean McGurk chapter

    Did the US want Stuxnet to be discovered

    How her book differed from David Sanger’s book

    How Stuxnet infected Natanz

    Details on Stuxnet version 0.5 that only spread through Siemens project files

    The Unsolicited Response Podcast has been inactive for a while now, which is a shame because I enjoy doing it and get a lot of positive feedback. Much of the difficulty in recording the podcast has been solved now that I have a very mobile podcast rig that I can bring with while traveling.

    I’m committed to a minimum of 20 podcasts in 2015, and there are a few compelling guests already lined up. We will wait until five episodes are recorded before bringing on podcast sponsors, but let us know if you are interested in sponsoring Unsolicited Response.

    Subscribe to the Unsolicited Response Podcast in iTunes.

    http://www.digitalbond.com/blog/2015/02/17/unsolicited-response-podcast-interview-with-kim-zetter-from-s4x15/

    —Huffduffed by sigerson